Welcome!

Java IoT Authors: Jeev Trika, Liz McMillan, Elizabeth White, Pat Romanski, Automic Blog

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, @BigDataExpo

@CloudExpo: Article

Four Things to Consider for E-Signature Security in the Cloud

Striking the right balance to manage risk while ensuring maximum adoption

As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a lower total cost of ownership. What organizations concerned with cloud security may not know is that all e-signature solutions are not created equal; enterprise-class cloud e-signatures enable security that is beyond simply passing a security audit or obtaining certification. There are four areas organizations should keep in mind when considering SaaS e-signatures.

1. Data Protection
Recent large-scale data breaches and general concern over personal privacy in digital spaces have understandably left many wondering if their customer data is secure. E-signature solution vendors have the responsibility to ensure data is safe, which includes protecting against privacy breaches or malware attacks and ensuring that data is encrypted in transit and at rest.

In order to demonstrate that the organization has adequate controls for data protection, including technology and processes, the e-signature service host should meet the strictest certification standards like Service Organization Controls (SOC) 2, which reflects that the organization has adequate controls for data protection, including technology and processes.

The good news is that cloud computing has matured over the years and now offers trustworthy infrastructure solutions with stringent security protocols in place. However, the infrastructure used not only needs to ensure high availability, but also that the data is securely backed up and is protected against unauthorized access. The e-signature provider should be leveraging a mature, trusted and certified cloud infrastructure solution such as Amazon Web Services rather than relying on in-house servers. Finally, when evaluating an e-signature vendor, it's important to ask what security protocols and controls are in place to ensure it is keeping data safe and secure.

2. Strong Identification, Authentication & Attribution
Security and user identification, authentication and attribution are important considerations for organizations wanting to embrace cloud-based technologies. Identification is the progress of verifying someone's identity either in person or remotely, whereas authentication is the process of verifying user credentials (most often user name and password) prior to giving access to a system - in this case, e-signing. Many financial services, insurance, healthcare and government organizations require advanced authentication methods to validate the identity of signers. Examples of identification can include email, SMS text passcode, Q&A and third-party authentication services. The e-signature solution should offer a variety of ways to authenticate signers depending on:

  • The legal and compliance risk
  • The likelihood of fraud
  • The value of the process being automated

3. Tamper-Evident E-Signatures
With tamper-evident controls, all parties involved in a transaction can trust the integrity of a signed document. If the document has been adjusted even slightly, it will invalidate any signatures and alert signers to the fact that it has been tampered with.

In order to ensure these controls are properly in place, digital signature technology should be applied at each signature location, creating a digital fingerprint of the document (called a hash) that can be used at any point to verify the integrity of the electronic record. This verification should take place in the document rather than sending the use to the vendor's website to validate the signature. Since e-signatures are only as good as the security that protects them, it's important that any attempt to tamper with any part of the document, for example adding or deleting words or replacing pages, should be visible. An enterprise-class e-signature solution should demonstrate this tampering by invalidating all the signature areas within the document.

4. Detailed Evidence Through an Embedded Audit Trail
The hashing of information into the document not only secures a document but it also creates a reliable and consistent audit trail of who signed, in what order, at what time and in what locations. Further, using e-signatures built on digital signature technology, the audit trail is securely embedded into the document. That means that all electronic signatures, the time stamping and the audit trails would be embedded directly within the document and not stored separately in the cloud or ‘logically' associated in a vault or proprietary database.

Organizations should have access to this data without having to depend on a vendor or its systems for access. This type of vendor independence is a concern for many organizations looking at cloud applications and gives users peace of mind that their valuable business records will remain in their control for as long as their retention policies require. An embedded audit trail means your e-signed records will work seamlessly with your content management systems or your chosen system of record.

When it comes to electronic signatures, taking a multi-pronged approach will ensure the highest level of security for documents and data that pass through a cloud e-signature solution. At the same time, it's important to choose an enterprise-class e-signature solution that offers additional security measures like embedding all data associated with the transaction into the document, reliably reproducing that data as evidence in the event of a dispute and enabling the reduction of risk around non-compliance. Ultimately, this multilayer approach to cloud e-signature security will foster customer confidence and protect an organization's reputation.

As organizations ponder these security features and requirements, it is highly recommended that they apply a level of controls and safeguards comparable to the paper process. Some organizations have a tendency to believe that putting a process online requires stricter security, however security and usability can at times be opposing forces. Organizations must strike the right balance so to manage risk while ensuring maximum adoption.

More Stories By Tommy Petrogiannis

Tommy Petrogiannis is CEO & Co-Founder of Silanis. As President and CEO, he is responsible for setting the company strategy and vision, building corporate culture and ensuring the entire team is working towards the corporate goal of delivering the ‘best possible customer experience’.

Within Silanis, Tommy has inspired a deeply-rooted culture of charitable giving and community involvement, supporting causes proposed by employees as well as those to which the company has a longstanding commitment. These have included the Royal Victoria Hospital’s Tiny Survivors Program, Canderel Cancer Run, Leukemia & Lymphoma Society, Kids Code Program and others.

Tommy’s two decades of IT experience include positions at Compaq and Matrox Electronics.

He holds a BS in engineering from Concordia University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...